Training Video Course

N10-008: CompTIA Network+ (N10-008)

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The N10-008 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA N10-008 test with flying colors.

Rating
4.45rating
Students
96
Duration
18:32:00 h
$16.49
$14.99

Curriculum for N10-008 Certification Video Course

Name of Video Time
Play Video: 1.0 Introducing Reference Models and Protocols
1. 1.0 Introducing Reference Models and Protocols
1:00
Play Video: 1.1 OSI Model
2. 1.1 OSI Model
10:00
Play Video: 1.2 TCP:IP Model
3. 1.2 TCP:IP Model
3:00
Play Video: 1.3 IP, ICMP, UDP, and TCP
4. 1.3 IP, ICMP, UDP, and TCP
9:00
Play Video: 1.4 IP, UDP, and TCP Headers
5. 1.4 IP, UDP, and TCP Headers
15:00
Play Video: 1.5 Maximum Transmission Unit (MTU)
6. 1.5 Maximum Transmission Unit (MTU)
5:00
Play Video: 1.6 Ports and Protocols
7. 1.6 Ports and Protocols
18:00
Name of Video Time
Play Video: 2.0 Network Pieces and Parts
1. 2.0 Network Pieces and Parts
1:00
Play Video: (N10-007 ONLY) 2.1 Analog Modems
2. (N10-007 ONLY) 2.1 Analog Modems
4:00
Play Video: 2.2 CSMA-CD vs CSMA-CA
3. 2.2 CSMA-CD vs CSMA-CA
6:00
Play Video: 2.3 Hubs, Switches, and Routers
4. 2.3 Hubs, Switches, and Routers
10:00
Play Video: 2.4 Collision and Broadcast Domains
5. 2.4 Collision and Broadcast Domains
5:00
Play Video: 2.5 Wireless Access Points
6. 2.5 Wireless Access Points
2:00
Play Video: 2.6 Firewalls
7. 2.6 Firewalls
5:00
Play Video: 2.7 Intrusion Detection and Prevention
8. 2.7 Intrusion Detection and Prevention
4:00
Play Video: 2.8 VPN Concentrators
9. 2.8 VPN Concentrators
2:00
Play Video: 2.9 Load Balancers
10. 2.9 Load Balancers
2:00
Play Video: 2.10 Advanced Filtering Appliances
11. 2.10 Advanced Filtering Appliances
6:00
Play Video: 2.11 Proxy Server
12. 2.11 Proxy Server
3:00
Name of Video Time
Play Video: 3.1 Star Topology
1. 3.1 Star Topology
3:00
Play Video: 3.2 Mesh Topology
2. 3.2 Mesh Topology
4:00
Play Video: 3.3 Ring Topology
3. 3.3 Ring Topology
3:00
Play Video: 3.4 Bus Topology
4. 3.4 Bus Topology
3:00
Play Video: (N10-007 ONLY) 3.5 Point-to-Point Topology
5. (N10-007 ONLY) 3.5 Point-to-Point Topology
2:00
Play Video: (N10-007 ONLY) 3.6 Point-to-Multipoint Topology
6. (N10-007 ONLY) 3.6 Point-to-Multipoint Topology
2:00
Play Video: (N10-007 ONLY) 3.7 Hybrid Topology
7. (N10-007 ONLY) 3.7 Hybrid Topology
1:00
Play Video: 3.8 Client-Server Network
8. 3.8 Client-Server Network
2:00
Play Video: 3.9 Peer-to-Peer Network
9. 3.9 Peer-to-Peer Network
2:00
Play Video: 3.10 Local Area Network (LAN)
10. 3.10 Local Area Network (LAN)
1:00
Play Video: 3.11 Wide Area Network (WAN)
11. 3.11 Wide Area Network (WAN)
3:00
Play Video: 3.12 Metropolitan Area Network (MAN)
12. 3.12 Metropolitan Area Network (MAN)
3:00
Play Video: 3.13 Campus Area Network (CAN)
13. 3.13 Campus Area Network (CAN)
2:00
Play Video: 3.14 Personal Area Network (PAN)
14. 3.14 Personal Area Network (PAN)
1:00
Play Video: 3.15 Wireless LAN (WLAN)
15. 3.15 Wireless LAN (WLAN)
3:00
Play Video: 3.16 Software-Defined WAN (SD-WAN)
16. 3.16 Software-Defined WAN (SD-WAN)
6:00
Play Video: 3.17 Industrial Control Systems and SCADA
17. 3.17 Industrial Control Systems and SCADA
4:00
Name of Video Time
Play Video: 4.0 Understanding Network Services
1. 4.0 Understanding Network Services
1:00
Play Video: 4.1 Virtual Private Networks (VPNs)
2. 4.1 Virtual Private Networks (VPNs)
10:00
Play Video: 4.2 Dynamic Multipoint VPNs (DMVPNs)
3. 4.2 Dynamic Multipoint VPNs (DMVPNs)
5:00
Play Video: 4.3 Web Services
4. 4.3 Web Services
3:00
Play Video: 4.4 Voice Services
5. 4.4 Voice Services
5:00
Play Video: 4.5 DHCP
6. 4.5 DHCP
8:00
Play Video: 4.6 DNS
7. 4.6 DNS
10:00
Play Video: 4.7 NAT
8. 4.7 NAT
12:00
Play Video: 4.8 NTP
9. 4.8 NTP
4:00
Play Video: 4.9 SDN
10. 4.9 SDN
7:00
Play Video: 4.10 IoT
11. 4.10 IoT
9:00
Play Video: 4.11 SIP Trunks
12. 4.11 SIP Trunks
6:00
Name of Video Time
Play Video: 5.0 Selecting WAN Technologies
1. 5.0 Selecting WAN Technologies
1:00
Play Video: (N10-007 ONLY) 5.1 Packet Switched vs. Circuit Switched Networks
2. (N10-007 ONLY) 5.1 Packet Switched vs. Circuit Switched Networks
2:00
Play Video: 5.2 Cellular
3. 5.2 Cellular
5:00
Play Video: (N10-007 ONLY) 5.3 Frame Relay
4. (N10-007 ONLY) 5.3 Frame Relay
2:00
Play Video: (N10-007 ONLY) 5.4 ATM
5. (N10-007 ONLY) 5.4 ATM
2:00
Play Video: 5.5 Satellite
6. 5.5 Satellite
4:00
Play Video: 5.6 Cable
7. 5.6 Cable
2:00
Play Video: 5.7 PPP
8. 5.7 PPP
3:00
Play Video: 5.8 PPPoE
9. 5.8 PPPoE
3:00
Play Video: 5.9 DSL
10. 5.9 DSL
4:00
Play Video: (N10-007 ONLY) 5.10 Leased Lines
11. (N10-007 ONLY) 5.10 Leased Lines
14:00
Play Video: (N10-007 ONLY) 5.11 ISDN
12. (N10-007 ONLY) 5.11 ISDN
8:00
Play Video: 5.12 MPLS
13. 5.12 MPLS
4:00
Play Video: 5.13 Metro Ethernet
14. 5.13 Metro Ethernet
3:00
Name of Video Time
Play Video: 6.0 Connecting Networks with Cables and Connectors
1. 6.0 Connecting Networks with Cables and Connectors
1:00
Play Video: 6.1 Copper Cables
2. 6.1 Copper Cables
9:00
Play Video: 6.2 Fiber Cables
3. 6.2 Fiber Cables
4:00
Play Video: 6.3 Copper Connectors
4. 6.3 Copper Connectors
5:00
Play Video: 6.4 Fiber Connectors
5. 6.4 Fiber Connectors
6:00
Play Video: 6.5 Media Converters
6. 6.5 Media Converters
2:00
Play Video: 6.6 Transceivers
7. 6.6 Transceivers
4:00
Play Video: 6.7 Termination Points
8. 6.7 Termination Points
7:00
Play Video: 6.8 Cabling Tools
9. 6.8 Cabling Tools
15:00
Play Video: 6.9 Punch-Down Blocks
10. 6.9 Punch-Down Blocks
2:00
Play Video: 6.10 T568 Standards
11. 6.10 T568 Standards
2:00
Play Video: 6.11 Straight-Through vs. Crossover Cables
12. 6.11 Straight-Through vs. Crossover Cables
5:00
Play Video: 6.12 Ethernet Standards
13. 6.12 Ethernet Standards
12:00
Name of Video Time
Play Video: 7.0 Using Ethernet Switches
1. 7.0 Using Ethernet Switches
1:00
Play Video: 7.1 MAC Addresses
2. 7.1 MAC Addresses
5:00
Play Video: 7.2 Ethernet Switch Frame Forwarding
3. 7.2 Ethernet Switch Frame Forwarding
7:00
Play Video: 7.3 VLAN Theory
4. 7.3 VLAN Theory
3:00
Play Video: 7.4 Trunking Theory
5. 7.4 Trunking Theory
4:00
Play Video: 7.5 Voice VLANs
6. 7.5 Voice VLANs
9:00
Play Video: 7.6 Ethernet Port Flow Control
7. 7.6 Ethernet Port Flow Control
3:00
Play Video: 7.7 Power over Ethernet (PoE)
8. 7.7 Power over Ethernet (PoE)
4:00
Play Video: 7.8 Introducing Spanning Tree Protocol (STP)
9. 7.8 Introducing Spanning Tree Protocol (STP)
2:00
Play Video: 7.9 STP Port States
10. 7.9 STP Port States
9:00
Play Video: 7.10 STP Example
11. 7.10 STP Example
7:00
Play Video: 7.11 STP Convergence Times
12. 7.11 STP Convergence Times
3:00
Play Video: 7.12 STP Variants
13. 7.12 STP Variants
13:00
Play Video: 7.13 Link Aggregation
14. 7.13 Link Aggregation
9:00
Play Video: 7.14 Port Mirroring
15. 7.14 Port Mirroring
2:00
Play Video: 7.15 Distributed Switching
16. 7.15 Distributed Switching
5:00
Name of Video Time
Play Video: 8.0 Demystifying Wireless Networks
1. 8.0 Demystifying Wireless Networks
1:00
Play Video: 8.1 Introduction to Wireless LANs (WLANs)
2. 8.1 Introduction to Wireless LANs (WLANs)
5:00
Play Video: 8.2 WLAN Antennas
3. 8.2 WLAN Antennas
5:00
Play Video: 8.3 Wireless Range Extenders
4. 8.3 Wireless Range Extenders
1:00
Play Video: 8.4 WLAN Frequencies and Channels
5. 8.4 WLAN Frequencies and Channels
5:00
Play Video: 8.5 WLAN Standards
6. 8.5 WLAN Standards
19:00
Play Video: 8.6 Regulatory Impacts of Wireless Channels
7. 8.6 Regulatory Impacts of Wireless Channels
3:00
Name of Video Time
Play Video: 9.0 Addressing Networks with IPv4
1. 9.0 Addressing Networks with IPv4
1:00
Play Video: 9.1 Binary Numbering
2. 9.1 Binary Numbering
6:00
Play Video: 9.2 Binary Practice Exercise #1
3. 9.2 Binary Practice Exercise #1
1:00
Play Video: 9.3 Binary Practice Exercise #2
4. 9.3 Binary Practice Exercise #2
3:00
Play Video: 9.4 IPv4 Address Format
5. 9.4 IPv4 Address Format
8:00
Play Video: 9.5 Public vs. Private IPv4 Addresses
6. 9.5 Public vs. Private IPv4 Addresses
5:00
Play Video: 9.6 IPv4 Unicast, Broadcast, and Multicast
7. 9.6 IPv4 Unicast, Broadcast, and Multicast
4:00
Play Video: 9.7 The Need for Subnetting
8. 9.7 The Need for Subnetting
7:00
Play Video: 9.8 Calculating Available Subnets
9. 9.8 Calculating Available Subnets
4:00
Play Video: 9.9 Calculating Available Hosts
10. 9.9 Calculating Available Hosts
4:00
Play Video: 9.10 Subnetting Practice Exercise #1
11. 9.10 Subnetting Practice Exercise #1
4:00
Play Video: 9.11 Subnetting Practice Exercise #2
12. 9.11 Subnetting Practice Exercise #2
3:00
Play Video: 9.12 Calculating Usable Ranges of IPv4 Addresses
13. 9.12 Calculating Usable Ranges of IPv4 Addresses
7:00
Play Video: 9.13 Subnetting Practice Exercise #3
14. 9.13 Subnetting Practice Exercise #3
4:00
Name of Video Time
Play Video: 10.0 Addressing Networks with IPv6
1. 10.0 Addressing Networks with IPv6
1:00
Play Video: 10.1 Hexadecimal Numbering
2. 10.1 Hexadecimal Numbering
8:00
Play Video: 10.2 IPv6 Address Format
3. 10.2 IPv6 Address Format
4:00
Play Video: 10.3 Shortening an IPv6 Address
4. 10.3 Shortening an IPv6 Address
3:00
Play Video: 10.4 IPv6 Address Shortening Exercise
5. 10.4 IPv6 Address Shortening Exercise
2:00
Play Video: 10.5 IPv6 Global Unicast
6. 10.5 IPv6 Global Unicast
3:00
Play Video: 10.6 IPv6 Multicast
7. 10.6 IPv6 Multicast
4:00
Play Video: 10.7 IPv6 Link Local
8. 10.7 IPv6 Link Local
3:00
Play Video: 10.8 IPv6 Unique Local
9. 10.8 IPv6 Unique Local
2:00
Play Video: 10.9 IPv6 Loopback
10. 10.9 IPv6 Loopback
1:00
Play Video: 10.10 IPv6 Unspecified
11. 10.10 IPv6 Unspecified
3:00
Play Video: 10.11 IPv6 Solicited-Node Multicast
12. 10.11 IPv6 Solicited-Node Multicast
3:00
Play Video: 10.12 EUI-64 Address
13. 10.12 EUI-64 Address
4:00
Play Video: 10.13 IPv6 Autoconfiguration
14. 10.13 IPv6 Autoconfiguration
2:00
Play Video: 10.14 IPv6 Traffic Flows
15. 10.14 IPv6 Traffic Flows
3:00
Play Video: 10.15 Dual Stack
16. 10.15 Dual Stack
1:00
Play Video: 10.16 Tunneling IPv6 Through an IPv4 Network
17. 10.16 Tunneling IPv6 Through an IPv4 Network
2:00
Play Video: (N10-007 ONLY) 10.17 IP Address Management (IPAM)
18. (N10-007 ONLY) 10.17 IP Address Management (IPAM)
1:00
Name of Video Time
Play Video: 11.0 Explaining IP Routing
1. 11.0 Explaining IP Routing
1:00
Play Video: 11.1 Packet flow in a Routed Network
2. 11.1 Packet flow in a Routed Network
7:00
Play Video: 11.2 Static and Default Routes
3. 11.2 Static and Default Routes
3:00
Play Video: 11.3 Routing Protocols
4. 11.3 Routing Protocols
12:00
Play Video: 11.4 RIP
5. 11.4 RIP
9:00
Play Video: 11.5 OSPF
6. 11.5 OSPF
15:00
Play Video: 11.6 EIGRP
7. 11.6 EIGRP
14:00
Play Video: 11.7 BGP
8. 11.7 BGP
5:00
Play Video: 11.8 Subinterfaces
9. 11.8 Subinterfaces
3:00
Name of Video Time
Play Video: 12.0 Streaming Voice and Video with united communications
1. 12.0 Streaming Voice and Video with united communications
1:00
Play Video: 12.1 Voice over IP
2. 12.1 Voice over IP
10:00
Play Video: 12.2 Video over IP
3. 12.2 Video over IP
9:00
Play Video: 12.3 Unified Communications Networks
4. 12.3 Unified Communications Networks
7:00
Play Video: 12.4 Quality of Service (QoS) Fundamentals
5. 12.4 Quality of Service (QoS) Fundamentals
15:00
Play Video: 12.5 QoS Markings
6. 12.5 QoS Markings
14:00
Play Video: 12.6 QoS Traffic Shaping and Policing
7. 12.6 QoS Traffic Shaping and Policing
7:00
Name of Video Time
Play Video: 13.0 Virtualizing Network Devices
1. 13.0 Virtualizing Network Devices
1:00
Play Video: 13.1 Virtualized Devices
2. 13.1 Virtualized Devices
7:00
Play Video: 13.2 Virtual IP
3. 13.2 Virtual IP
8:00
Play Video: 13.3 Storage Area Network (SAN) Technologies
4. 13.3 Storage Area Network (SAN) Technologies
4:00
Play Video: 13.4 Using InfiniBand for SANs
5. 13.4 Using InfiniBand for SANs
2:00
Play Video: 13.5 Cloud Technologies
6. 13.5 Cloud Technologies
7:00
Play Video: 13.6 Accessing Cloud Services
7. 13.6 Accessing Cloud Services
2:00
Play Video: 13.7 Infrastructure as Code
8. 13.7 Infrastructure as Code
6:00
Play Video: 13.8 Multi-Tenancy
9. 13.8 Multi-Tenancy
3:00
Name of Video Time
Play Video: 14.0 Securing a Network
1. 14.0 Securing a Network
1:00
Play Video: 14.1 General Security and Availability Issues
2. 14.1 General Security and Availability Issues
19:00
Play Video: 14.2 Vulnerabilities and Exploits
3. 14.2 Vulnerabilities and Exploits
2:00
Play Video: 14.3 Denial of Service Attacks
4. 14.3 Denial of Service Attacks
6:00
Play Video: 14.4 On-Path Attacks
5. 14.4 On-Path Attacks
10:00
Play Video: 14.5 VLAN Hopping Attacks
6. 14.5 VLAN Hopping Attacks
4:00
Play Video: 14.6 Social Engineering Attacks
7. 14.6 Social Engineering Attacks
2:00
Play Video: 14.7 Other Common Attacks
8. 14.7 Other Common Attacks
9:00
Play Video: 14.8 Common Defense Strategies
9. 14.8 Common Defense Strategies
11:00
Play Video: 14.9 Switch Port Defense
10. 14.9 Switch Port Defense
3:00
Play Video: 14.10 Access Control Lists
11. 14.10 Access Control Lists
7:00
Play Video: 14.11 Wireless Security Options
12. 14.11 Wireless Security Options
14:00
Play Video: 14.12 Extensible Authentication Protocols (EAPs)
13. 14.12 Extensible Authentication Protocols (EAPs)
5:00
Play Video: 14.13 Authentication Servers
14. 14.13 Authentication Servers
9:00
Play Video: 14.14 User Authentication
15. 14.14 User Authentication
5:00
Play Video: 14.15 Physical Security
16. 14.15 Physical Security
6:00
Play Video: 14.16 Forensic Concepts
17. 14.16 Forensic Concepts
4:00
Play Video: 14.17 Securing STP
18. 14.17 Securing STP
5:00
Play Video: 14.18 Router Advertisement (RA) Guard
19. 14.18 Router Advertisement (RA) Guard
3:00
Play Video: 14.19 Securing DHCP
20. 14.19 Securing DHCP
6:00
Play Video: 14.20 IoT Security Concerns
21. 14.20 IoT Security Concerns
4:00
Play Video: 14.21 Cloud Security
22. 14.21 Cloud Security
2:00
Play Video: 14.22 IT Risk Management
23. 14.22 IT Risk Management
4:00
Name of Video Time
Play Video: 15.0 Monitoring and Analyzing Networks
1. 15.0 Monitoring and Analyzing Networks
1:00
Play Video: 15.1 Device Monitoring Tools
2. 15.1 Device Monitoring Tools
8:00
Play Video: 15.2 SNMP
3. 15.2 SNMP
5:00
Play Video: 15.3 Remote Access Methods
4. 15.3 Remote Access Methods
7:00
Play Video: 15.4 Environment Monitoring
5. 15.4 Environment Monitoring
3:00
Play Video: 15.5 Wireless Network Monitoring
6. 15.5 Wireless Network Monitoring
5:00
Name of Video Time
Play Video: 16.0 Examining Best Practices for Network Administration
1. 16.0 Examining Best Practices for Network Administration
1:00
Play Video: 16.1 Safety Procedures
2. 16.1 Safety Procedures
6:00
Play Video: 16.2 Wiring Management
3. 16.2 Wiring Management
7:00
Play Video: 16.3 Power Management
4. 16.3 Power Management
5:00
Play Video: 16.4 Rack Management
5. 16.4 Rack Management
4:00
Play Video: 16.5 Change Control
6. 16.5 Change Control
4:00
Play Video: 16.6 High Availability
7. 16.6 High Availability
5:00
Play Video: 16.7 Cloud High Availability
8. 16.7 Cloud High Availability
3:00
Play Video: 16.8 Active-Active vs. Active-Passive
9. 16.8 Active-Active vs. Active-Passive
10:00
Play Video: 16.9 Disaster Recovery
10. 16.9 Disaster Recovery
8:00
Play Video: 16.10 Standards, Policies, and Rules
11. 16.10 Standards, Policies, and Rules
10:00
Play Video: 16.11 Documentation
12. 16.11 Documentation
7:00
Play Video: 16.12 Site Survey
13. 16.12 Site Survey
2:00
Name of Video Time
Play Video: 17.0 Troubleshooting Networks
1. 17.0 Troubleshooting Networks
1:00
Play Video: 17.1 7-Step Troubleshooting Methodology
2. 17.1 7-Step Troubleshooting Methodology
12:00
Play Video: 17.2 CLI Troubleshooting Utilities
3. 17.2 CLI Troubleshooting Utilities
20:00
Play Video: 17.3 Network Appliance Commands
4. 17.3 Network Appliance Commands
10:00
Play Video: 17.4 Device Metrics and Sensors
5. 17.4 Device Metrics and Sensors
3:00
Play Video: 17.5 Environmental Metrics and Sensors
6. 17.5 Environmental Metrics and Sensors
2:00
Play Video: 17.6 Common LAN Issues
7. 17.6 Common LAN Issues
6:00
Play Video: 17.7 Common Wireless Network Issues
8. 17.7 Common Wireless Network Issues
7:00
Play Video: 17.8 Common Network Service Issues
9. 17.8 Common Network Service Issues
12:00
Play Video: 17.9 General Networking Issues
10. 17.9 General Networking Issues
6:00
Name of Video Time
Play Video: 18.0 Preparing for the CompTIA Network+ Exam
1. 18.0 Preparing for the CompTIA Network+ Exam
1:00
Play Video: 18.1 How to Register for the Exam
2. 18.1 How to Register for the Exam
4:00
Play Video: 18.2 Study Strategies
3. 18.2 Study Strategies
7:00
Play Video: 18.3 What to do on Exam Day
4. 18.3 What to do on Exam Day
4:00

CompTIA N10-008 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA N10-008 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA N10-008 Premium Bundle
$69.97
$49.99

N10-008 Premium Bundle

  • Premium File: 877 Questions & Answers. Last update: Nov 6, 2024
  • Training Course: 211 Video Lectures
  • Study Guide: 1485 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

N10-008 Premium Bundle

CompTIA N10-008 Premium Bundle
  • Premium File: 877 Questions & Answers. Last update: Nov 6, 2024
  • Training Course: 211 Video Lectures
  • Study Guide: 1485 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free N10-008 Exam Questions & N10-008 Dumps

File Name Size Votes
File Name
comptia.examcollection.n10-008.v2024-09-12.by.dylan.90q.vce
Size
283.54 KB
Votes
1
File Name
comptia.certkiller.n10-008.v2021-12-14.by.aria.52q.vce
Size
218.67 KB
Votes
1
File Name
comptia.examlabs.n10-008.v2021-09-28.by.roman.52q.vce
Size
102.87 KB
Votes
1

CompTIA N10-008 Training Course

Want verified and proven knowledge for CompTIA Network+ (N10-008)? Believe it's easy when you have ExamSnap's CompTIA Network+ (N10-008) certification video training course by your side which along with our CompTIA N10-008 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Module 5 - Selecting WAN Technologies

6. 5.5 Satellite

One option for reaching the Internet when a wired broadband service is not available is to use communicational a satellite using a technology like VSAT, whereat stands for Very Small Aperture Terminal. And we can use a satellite to relay communication between different corporate locations, as you see on screen, or between corporate locations and homes or the Internet. And that's what we're going to discuss in this video. Some of the characteristics of satellite-wan communication First of all, it is going to be two-way communication. It's not like satellite TV, where you're just receiving a signal. You're going to be able to transmit with this satellite dish as well. And the very small aperture that is referred to in the VSAT name. We're talking about the diameter of the satellite dish that gets installed at our different locations. By definition, it's going to be less than 3 meters. However, it is roughly the same size as a satellite dish that you might have on your house to receive television programming. And because VSAT can work without any copper, cabling, or fiber optics running at your location, it can be a great solution for more remote locations that do not have a wired Internet connection or at least a high-speed wired Internet connection.

And another place you might see Visit is on something like an oil rig out in the middle of the Gulf of Mexico. Or maybe on a ship. For example, if you take a cruise on a cruise ship, you might be given the option to purchase access to the Internet. Did you ever wonder how that ship out in the middle of the ocean could get to the Internet? Well, it's using some variant of VSAT technology in the data rates that are possible with satellite communication. They've really improved over the years, and they now have maximum speeds in the range of about twelve megabits per second to about 100 megabits per second. But one of the drawbacks that I want you to be aware of is that because we're having to travel further up into space to get to the satellite, delays are going to be more than what we might be used to with a more traditional terrestrial internet connection. You see the satellite, we're bouncing off of it. It's in geosynchronous orbit above the Earth's equator. Specifically, it's about 22 miles above the equator. And even the light waves and radio waves, they travel very, very fast. They travel at 186 0 miles per second, or three times the speed of light in a vacuum. Suddenly, we're travelling thousands of miles.

It's over 22,000 miles to get from our location to the satellite. It's over 22,000 miles to get from the satellite back to the service provider's ground station. And then there's the delay of going out to the Internet from that ground station. So the delay starts to add up. And for a couple of years, my family and I lived in a newly constructed home where broadband was not yet available. It wasn't available from the local telephone company or the cable company. So I used this satellite technology to get on the Internet, and what I've personally noticed is a trip delay of about half a second. Now, that's not a huge deal if you're just downloading something or if you're streaming Netflix, but if you're trying to use some interactive application like Voice Over IP, this is not a great solution because there is a noticeable amount of delay when you're trying to talk back and forth with someone. And another caveat that I want you to be aware of is that this technology can be sensitive to weather conditions. You've got the satellite dish mounted on your building and a big thunderstorm rolls in. And I've seen this happen many, many times where a weather system can interrupt communication between your location and the satellite, and you have to wait for that weather condition to clear before communication can resume. However, in some circumstances, VSAT just might be the best option for getting us to another site or out to the Internet.

7. 5.6 Cable

One of the most popular technologies found in homes today for getting out to the Internet or maybe connecting back to our main office over a secure virtual private network or a VPN is cable modems. And a cable modem can use our television cable as the medium to get out to the Internet. And cable companies? They often have networks composed of both fiber optics and coaxial cable. This infrastructure is called a hybrid fiber coax or HFC distribution network. And on this network, specific frequency ranges are dedicated to specific television channels. But we can also have a frequency dedicated to transmitting data and an frequency dedicated to receiving data. In other words, upstream and downstream communications. And we usually have a wider range of frequencies for downstream communication. That's the reason that most cable modems have more bandwidth coming in than going back out to the Internet.

One downside, though, is you probably don't have an ADSL line going back to your cable company, which means you may be sharing bandwidth with your neighbors. Some people report that in the evening when most of their neighbors are at home, their internet speed drops a little bit. And there are different standards that specify what frequency ranges can be used and for what purpose. And these specifications are different Doxes versions. where DOCSIS stands for Data Over Cable Service Interface Specification. Different countries might have their own version of DOCSIS. For example, many European countries have their own standards about what frequencies can be used for data and those standards are called Euro Doxes. And the bandwidth available using cable modems has continually improved over the years. At the time of this recording, the most recent version of Doxes is Doxes 40, and it has a maximum downstream speed of ten gigabits per second and a maximum upstream speed of six gigabits per second. And that's a look at cable modems.

8. 5.7 PPP

When we're communicating between a couple of devices like routers, we have to have some sort of allayer to protocol and oftentimes on serial links, we use the point-to-point protocol, or PPP. In fact, there's even a way to do a PPP over an Ethernet connection. And the reason we might do that is to take advantage of some of the features of the point-to-point protocol. Let's consider some of those features in this video. One thing that PPP offers us is the ability to do authentication. We could do authentication using something called PAP (password authentication protocol) or Chap (handshake authentication protocol). And the strong recommendation is to use Chapin instead of PAP because PAP sends password information in clear text across the wire.

You probably do not want to do that. Something else that the point-to-point protocol can do for us is compress our data. If we were able to send more data with the same amount of bandwidth, that sounds like a really good thing. And that's what we can do with compression. We can run compression algorithms like Stacker or Predictor and it can compress the data. So if we're running low on bandwidth, we can send more data over our existing bandwidth. The trade off is running those compression algorithms. That does put a processor hit on our routers. So it might not be worth the tradeoff, but it is a feature of PPP. Another feature is the ability to detect errors that occur in transmission and then to correct those errors.

Now, personally, I'm not a big fan of this PPP feature because the way PPP accomplishes that correction is if it detects an error, then it has a duplicate copy of that packet that was corrupted and it will just use that duplicate copy. So that means we're sending a copy of all of our data, which is going to dramatically cut down on our bandwidth available. So I'm not a big fan of the way it does error detection and correction. Something I am a huge fan of is PPP's ability to do multiple links. We can have multiple physical links like serial links, and maybe a single serial link doesn't have enough bandwidth for our needs. But if we have multiple serial links, we can logically bundle those together using a protocol like MLP, short for Multiplying P2P, which is going to logically group those physical circuits into a single logical channel, which the router views as an interface with more bandwidth. It can talk over that logical channel, which is going to spread the data across those underlying physical pathways. And that's a look at a very popular two-or date link layer protocol. The point-to-point protocol.

9. 5.8 Pepo

The Point-to-Point Protocol, or PPP, is a layer two protocol, in other words, a datalink layer protocol that is oftentimes used on serial links between routers. PPP has some really cool features. And one of those features that we really like is its ability to do authentication. It can do authentication using PAP or CHAP PAP, which is a password authentication protocol. I don't recommend that one because it sends the password in clear text. The other one is much better. It's called Chap, or the Challenge Handshake authentication protocol. But we love that authentication feature of PPP so much that we oftentimes see it used in combination with Ethernet because Ethernet by itself does not have that ability to do authentication.

As a result, we overlay Ethernet with the Point of Point protocol in order to use the point-to-point protocol authentication feature, and we see Pepo, or point-to-point protocol over Ethernet, in DSL connections. Oftentimes, DSL was one of the early broadband technologies that gave people high-speed internet access from their homes. and DSL. That stands for Digital Subscriber Line. And the most popular type of DSL was called ADSL (asynchronous DSL). That allowed you to have a phone and possibly a laptop in your home while communicating over your single traditional phone line. That DSL modem and a filter could keep your phone conversation and your data separate and send it all out over a phone line. However, the DSL service providers wanted to ensure that when somebody connected a modem into their network, they were a paying customer. They wanted to do some sort of authentication and they could do that using the Point to Point protocol over Ethernet.

And if you've ever set up a DSL modem, you might remember that there's a place for a username and a password, and when that DSL modem boots up, it's going to go track to authenticate with what is called a DSLAM in the Service Providers club. A DSLAM is a DSL access multiplexer, and it's going to check those credentials that you provide from your DSL modem. The username and password, it's going to check those against an authentication server and, assuming the authentication process is successful, then the device in your home, like your laptop, can successfully communicate out to the Internet. But that's a way that the pointtopointProtocol feature of authentication was leveraged in an Ethernet environment to do authentication because Ethernet could not do authentication. And that technology is called Pepo. The point-to-point protocol over Ethernet.

10. 5.9 DSL

DSL, which stands for Digital Subscriber Line, is an abroad band technology that initially became very popular because it allowed a home user to have a high-speed internet connection using their existing telephone line. That type of DSL that was used in the home environment and often found in small businesses as well, was called ADSL, for Asymmetric DSL. The asymmetric implies that the upload and download speeds are different. And on the screen you see an example of what an ADSL connection might look like. The phone itself would probably have a filter on it, and that would filter out some of the higher frequencies used by DSL, so the user wouldn't hear the sound of data on the line. And the connection goes back to the DSL service provider and terminates on a piece of equipment called a DSLAM. That stands for DSL access multiplexer.

Basically, that's a device into which multiples subscribers connect, and then that DSLAMconnects them into the service provider's network. And the DSLAM is probably in the telephone central office, and it might be owned and operated by that telephone company. However, your DSL service provider might be a third party. And that third party may have rented floor space in the telephone company's central office. And on that floor space that they're reserving, they place their own DSLAM. That's called a "colo" or "colocation." In other words, they're collocating their equipment with the central office equipment. And there is a distance limitation of 180 feet from the DSL modem to the DSLAM. The reason is, when you have an electrical signal travelling over a telephone wire for thousands and thousands of feet, you can have some capacitance that builds up between those two wires. That's an electrical characteristic that can distort a waveform. It's called phase shift. And the telephone company for many, many years has been combating that capacitance by installing what's called a load coil. And they do that every 18 feet.

And those load coils... they add inductance to the line. And if you've studied electricity, you might remember that inductance is the opposite of capacitance. They cancel each other out. But the problem is, DSL can not cross one of those load coils. Hence the limitation. And just like you might log into a website, the DSL modem needs to log into the service provider's network. To do that, it needs to provide username and password credentials, and then they'll be authenticated by the DSL service provider's authentication server. So when you're setting up a DSL modem, enter those credentials as part of your setup. And what makes this login possible is the protocolPPPoE, which stands for point-to-point Protocol over Ethernet. And we're using Pepo so that we can leverage PPP's feature of doing authentication. And we've been talking about ADSL so far in this video, but there are several other variants of DSL, and some of those variants have different versions that run at different speeds. So there's a wide range of bandwidth that you might get from DSL.

Now, let's wrap up this video by doing a side-by-side comparison of some of the more popular DSL types. What we've been talking about is ADSL, or asymmetric DSL, implying that upload and download speeds are typically different. And we've mentioned that the maximum distance to the DSLAM is 18 ft. You might also have a symmetric DSL. This is where you have upload and download speeds that are the same. In fact, I used to work for a DSL company and this is all they offered: symmetric DSL. They marketed to businesses which had a greater need for upload speeds that might not be available with ADSL. The distance limitation to the DSLAM is a bit more restrictive, though it's 12,000 ft. and for some more speed, there's very high bitrate DSL or VDSL here. The upload and download speeds are probably different and the distance to the DSLAM is even more restrictive. It's 4000 ft. And that's a look at digital subscriber line technology.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA Network+ (N10-008) certification video training course that goes in line with the corresponding CompTIA N10-008 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about N10-008 Exams. Don't share your email address asking for N10-008 braindumps or N10-008 exam pdf files.

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.